US20240154809A1 - High assurance virtual encryption system - Google Patents
High assurance virtual encryption system Download PDFInfo
- Publication number
- US20240154809A1 US20240154809A1 US17/980,958 US202217980958A US2024154809A1 US 20240154809 A1 US20240154809 A1 US 20240154809A1 US 202217980958 A US202217980958 A US 202217980958A US 2024154809 A1 US2024154809 A1 US 2024154809A1
- Authority
- US
- United States
- Prior art keywords
- ves
- software
- rot
- user
- virtual
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3234—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
- H04L9/3213—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Definitions
- Embodiments provide an architecture, system, device, and method for a high assurance (HA) virtual encryptor (VE) system that can replace hardware encryptors (HWEs) and can be embedded into secure virtualized processing fabrics of datacenters used by cloud service providers.
- HA high assurance
- VE virtual encryptor
- HWEs hardware encryptors
- the HA VE can be used for protecting, managing, and communicating sensitive information without compromising security of the protected information.
- HWEs provide confidentiality, identity, and authentication services and contain cryptographic capabilities to perform encryption & decryption, key management, and encryptor management functions. They can have single or multi-channel capabilities and can protect data-at-rest (DAR) or data-in-transit (DIT) at any layer of the open systems interconnection (OSI) model including Layer 1 Link, Layer 2 Ethernet or Layer 3 Internet Protocol (IP) layer.
- HWEs can include Cross Domain Solution (CDS), Multi-Level Security (MLS), and cybersecurity capabilities.
- HWEs can take many physical forms such rack-mounted network equipment, handheld communication devices, and radiation-hardened space encryptors, all of which are difficult to integrate into computing fabrics of cloud datacenters due to their physical constraints.
- Hardware user tokens can be used to provide user identity or key/certificate data stored in smart cards, Crypto Ignition Key (CIK), and other user token devices.
- HWEs are provisioned with software, credentials, and key material before delivered to the end user and can maintain continuous connections with a network and/or key management system (KMS) for control and key/software updating.
- KMS key management system
- FIG. 1 illustrates, by way of example, a block diagram of an embodiment of an HA virtual encryptor (VE) system.
- VE virtual encryptor
- FIG. 2 illustrates, by way of example, a block diagram of an embodiment of a system that includes the secure datacenter of FIG. 1 in more detail.
- FIG. 3 illustrates, by way of example, a diagram of an embodiment of a redundant virtual machine (VM) VE configuration.
- VM virtual machine
- FIG. 4 illustrates, by way of example, a diagram of an embodiment of a diversity VM VE configuration.
- FIG. 5 illustrates, by way of example, a block diagram of an embodiment of a VE.
- FIG. 6 illustrates, by way of example, a block diagram of an embodiment of a key management system (KMS).
- KMS key management system
- FIG. 7 illustrates, by way of example, a block diagram of an embodiment of an user and orchestration manager (U/OM).
- U/OM user and orchestration manager
- FIG. 8 illustrates, by way of example, a diagram of an embodiment of a method for HA VES operation.
- FIG. 9 illustrates, by way of example, a diagram of an embodiment of a method for HA VES provisioning and operation.
- FIG. 10 illustrates, by way of example, a block diagram of an embodiment of a machine in the example form of a computer system within which instructions, for causing the machine to perform any one or more of the methods discussed herein, may be executed.
- HWE capabilities can be done securely by virtual encryptors (VEs) implemented in virtual machines (VMs) that run on hypervisors used in datacenters by cloud service providers.
- VEs virtual encryptors
- VMs virtual machines
- hypervisors used in datacenters by cloud service providers.
- This lowers the cost of implementing HWEs, standing up HA network systems, and enables far greater cryptographic services when VEs are embedded directly into the virtualized processing fabrics of datacenters that are not possible using HWEs.
- Cyber resiliency, zero trust, cloud orchestration, HA key management system (KMS), and physical user tokens produced by the KMS provides a secure virtual environment to protect VE operations and information in any type of cloud datacenter or computing system using virtualization.
- Virtualization uses software to simulate hardware functionality and allows a network to operate multiple operating systems and applications on a single server.
- Virtualization also provides economies of scale and greater efficiency than non-virtualized systems.
- Protected remote enclaves can be connected using HWE or VE.
- Data shared between enclaves having different classification levels can be provided through Cross Domain Solution (CDS) in multi-tenant cloud systems.
- CDS Cross Domain Solution
- HA networks for protecting sensitive information have limited capabilities and can depend on HWEs including End Crypto Units (ECUs) that are difficult to maintain and are not suitable for embedding into datacenter virtual processing fabrics.
- ECUs End Crypto Units
- Cloud computing technology solves the deficiencies of current stove-piped HA networks by allowing users to subscribe to HA computing from secure cloud service providers.
- HA means the system is meant to protect any level of sensitive information from high value commercial information to highly sensitive government information.
- Embodiments provide an architecture of a HA VE system, which aligns with zero trust principles, key and software provisioning, cyber resiliency, and cloud orchestration to provide, protect, and manage the life-cycle of VEs in secure datacenters and computer systems using virtualization.
- Embodiments support Crypto Modernization 2 (CM2) and Quantum Resistant (QR) algorithm standards.
- QR algorithms also known as post-quantum, quantum-secure, and quantum-safe—are cryptographic algorithms that can fend off attacks from quantum computers.
- FIG. 1 illustrates, by way of example, a block diagram of an embodiment of an HA VE system 100 .
- the system 100 as illustrated includes a secure cloud datacenter 110 communicatively coupled to a network 112 and a plurality of remote devices 114 , 116 , 118 , 130 , 132 where 132 is for remote management and 114 has a dedicated or direct secure connection.
- the secure datacenter 110 provides HA VE capabilities that are sufficient for protecting sensitive information.
- the secure datacenter 110 and its operations are described in more detail regarding FIG. 2 .
- the secure datacenter 110 can provide HA-as-a-service (HAaaS) cloud services that leverage Infrastructure as Code (IAC) and cloud orchestration capabilities to securely provision and operate cyber-resilient VEs at scale.
- HAAaaS HA-as-a-service
- the secure datacenter 110 can include multiple distributed VEs that enable multi-domain and multi-tenant datacenters using CDS and software-defined network (SDN) orchestration of virtual SDN switches and routers.
- the secure datacenter 110 contains HA crypto-agile and Quantum-safe KMS 148 . It also combines continuous, zero trust security-based monitoring and policy enforcement with advanced cyber resiliency and cloud orchestration capabilities.
- the secure datacenter 110 has the capability to service multiple tenant private clouds, illustrated as respective individual instances of tenant devices 114 , 116 , 118 , 130 , 132 .
- a respective customer associated with the tenant devices 114 , 116 , 118 , 130 , 132 each subscribe to services provided by the secure datacenter 110 .
- Each of the tenant devices 114 , 116 , 118 , 130 , 132 has a token access device 134 , 136 , 138 , 140 , 142 , respectively, that manages tokens.
- the tokens are authentication data that can activate VEs and allow access to services of the secure datacenter 110 .
- Example token access devices 134 , 136 , 138 , 140 , 142 are smart cards, CIK, smart phones, or other computing devices.
- the secure datacenter 110 can include a hardware KMS 144 .
- the KMS 144 manages user tokens, initialization, provisioning, and disablement, and key materials for accessing and activating VEs that provide encryption functionality.
- the secure datacenter 110 can include a user and orchestration management system (U/OM) 146 .
- the U/OM 146 includes cloud orchestration software and control software that configures and monitors tamper-resistant, cyber resilient software and zero trust security-focused software executing in a virtual encryption system (VES) 148 to continuously ensure VES-wide integrity and security.
- VES virtual encryption system
- the remote U/OM 132 can perform the same configuration and monitoring as the U/OM 146 , but not a VES software transfer operation. If available, the U/OM 146 can also utilize quantum networks and Quantum Key Distribution (QKD) schemes (e.g., BB84, B92, and others) as an additional layer of security for VES key distribution.
- QKD Quantum Key Distribution
- the VES 148 includes a group of VMs that operate in a secure virtual environment.
- the VES includes one or more VEs in the VMs that are instantiated on demand by the U/OM 146 and continuously monitored by cyber resilient software 242 (see FIG. 2 ) and zero trust software 244 (see FIG. 2 ).
- VMs provide virtual network functions (VNFs) 272 that can form networks of virtual switches and routers managed by SDN controllers.
- VNFs virtual network functions
- Each of the secure data center 110 and the tenant devices 114 , 116 , 118 , 130 , 132 can include a respective HWE or VE 150 , 152 , 154 , 156 , 158 , 160 .
- the HWE or VE is responsible for encrypting and decrypting data, cryptographic key management, and encryptor management. More details regarding a VE is provided in a later FIG.
- FIG. 2 illustrates, by way of example, a block diagram of an embodiment of a system 200 that includes the secure datacenter 110 in more detail.
- the system 200 as illustrated includes an external key authority 152 communicatively coupled securely to the secure datacenter 110 .
- the system 200 as illustrated further includes an end user 256 communicatively coupled securely to the secure datacenter 110 .
- the system 200 as illustrated further includes multiple VESs 262 communicatively coupled securely to one or more other VESs 148 within the datacenter 110 .
- the key authority 152 provides trust anchors (TAs), seed keys, and other crypto products from a trusted source.
- the crypto products from the key authority 152 allow the KMS 144 and VES 148 to trust each other and to securely derive mission, infrastructure and initialization keys and other crypto products.
- An example key authority includes the government's key management infrastructure (KMI).
- the KMS 144 performs crypto provisioning operations 254 .
- the crypto provisioning operations 254 program respective user tokens 234 , 240 , 260 used by the KMS 144 , the U/OM 146 , and the end user 256 , respectively.
- Each of the user tokens 234 , 240 , 260 is generated based on a token that is based on one or more shared secret values, credentials, identities, or split keys that are associated or bound to a VE. This is also known as cryptographic binding.
- a Crypto Ignition Key (CIK) is an example hardware token that stores key splits.
- the token is a numeric value that is used by the VES 148 to activate a VE 246 , 248 and verify whether a request from the end user 256 is legitimate, safe, and to be performed by the VES 148 , or is otherwise insecure and not to be performed by the VES 148 .
- the KMS 144 initializes user tokens 234 , 240 , 260 that are used to access and activate VMs 242 , 244 , 246 , 248 , 250 , 252 .
- the VES 148 can operate using an enhanced system (SYS) root of trust (SYS RoT) 264 device that is attached to a computer 266 as a stand-alone or pluggable (e.g., PCIe) hardware security module (HSM), a datacenter-ready control module (DC-SCM), M.2 plug-in module, or other cryptographic device.
- SYS RoT 264 enhances the security of the computer or server that provides the virtualization.
- the zero trust software 244 will continuously use the output of the SYS RoT 264 to detect potential hardware-level or software-level tampering with VES-related infrastructure.
- An HSM is a physical computing device that safeguards and manages digital keys, performs encryption and decryption functions for digital signatures, and other cryptographic functions.
- the HSM includes a secure crypto processor chip.
- the SYS RoT 264 can be a plug-in (a peripheral device coupled to a computer) or an external device coupled to a computer or network server.
- the SYS RoT 264 execute cyber resilient software (Boot CR SW) 270 that monitors the integrity of the boot operation of the computer or server. This verifies the bootloader, operating system or hypervisor software is not altered by a cyber attack.
- Boot CR SW cyber resilient software
- KMS 144 provisions the software contents of the VMs 242 , 244 , 246 , 248 , 250 , 252 . It provisions VEs 246 , 248 by configuring cryptographic algorithm/s with initial seed key material and encrypting and signing VE software instances.
- the KMS 144 can rekey VEs 246 , 248 , keep records of key material, wraps keys for storage, and send encrypted key and software packages to U/OM 146 to transfer to the VMs 246 , 248 .
- the KMS 144 also signs the cyber resilient software (CR SW) 242 and zero trust software 244 (ZT SW) that is installed in one or more of the VMs.
- CR SW cyber resilient software
- ZT SW zero trust software
- the KMS 144 sends mission keys to VEs 246 , 248 periodically during operation. Multiple KMS 144 units may be used to support scalability, high availability, and multi-level classifications.
- the KMS 144 can include a database of the user tokens 234 . 240 , 260 , VM 242 , 244 , 246 , 248 , 250 , 252 instances, encrypted keys, and other relevant data.
- the U/OM 146 utilizes Infrastructure as Code (IaC) services and cloud orchestration capabilities to automate the provisioning, deployment, and maintenance of VES 148 .
- An example cloud orchestration software is OvercastTM from Raytheon Company.
- the U/OM 146 performs cloud orchestration that launches and deletes software running in the VES 148 and controls connections between cloud datacenters. It also has the ability to live-migrate VE nodes or change the VES 148 network topologies on-the-fly to provide optional moving target defense capabilities.
- the U/OM 146 controls the ZT SW 244 and CR SW 242 , VEs 246 , 248 , and other software running in the VES 148 .
- Cloud orchestration automates the tasks to provision VE VMs 246 , deploy workloads, manage network visibility, and control user and workload access. Cloud orchestration also automates reclamation of unused capacity and returns it to resource pools. Cloud orchestration technologies integrate automated tasks and processes into a workflow to perform requested functions. Cloud orchestration can validate and/or authenticate VMs 242 , 244 , 246 , 248 , 250 , 252 .
- the U/OM 146 can support a wide range of open standard network management software.
- the U/OM 146 supports a unique combination of complementary cyber resilient and multi-level zero trust sensors and effectors, coupled with advanced, cryptographic resource, data, network, host, and service binding.
- the U/OM 146 can leverage out-of-band quantum key distribution network to further secure communications.
- the U/OM 146 can be integrated with IaC and software-defined wide area network (SDWAN) capabilities, such as to enable enterprise-level scalability, mission resiliency, and active defense (e.g., via polymorphic networking & moving target defense) at the same time.
- SDWAN software-defined wide area network
- the VES 148 is a secure virtual environment in which software packages execute in VMs. Some of the VMs can operate as virtual encryptors. The VES 148 can execute the cyber resilient software and zero trust software that are controlled or managed by the U/OM 146 . The CR SW 242 and the ZT SW 244 operate to protect the VES 148 from a cyber attack.
- the VMs 242 , 244 , 246 , 248 , 250 , 252 are software that operate in a guest machine (software) that runs on a hypervisor (a physical host machine).
- the VMs 242 , 244 , 246 , 248 , 250 , 252 can perform virtual encryptor operations (“virtual” because the encryption is performed in a VM).
- the U/OM 246 can consist of one or multiple workstations running cloud orchestration, cyber resilient, zero trust, VE management, SDN, and other software applications.
- Boot CR SW 270 is running in the SYS RoT 264 for the VES 148 server and monitors boot functions of the VES 148 .
- Boot ShieldTM and Electronic ArmorTM from Raytheon Company are examples of CR SW 242 and Boot CR SW 270 .
- the VES 248 includes ZT SW 244 that continuously monitors the VES 148 for internal or external cyber attacks.
- the ZT SW 244 can work hand in hand with the CR SW 242 to detect and fend off common VE host attacks, including insider threats.
- REDPro ZTXTM from Raytheon Company is an example of ZT SW 244 .
- the VES 148 can operate using an additional SYS RoT 264 .
- the SYS RoT 264 provides independent, hardware attestation as well as trusted, secure boot capabilities that can decrypt and authenticate its own and a host's bootloader and application software.
- the SYS RoT 264 performs system integrity, tamper detection, and cryptographic functions and can share its observations with the ZT SW 244 to enable multi-level ZT security enforcement.
- the SYS RoT 264 can verify signatures (e.g., using standard or QR algorithms) of software used in the VES 148 including host's bootloader, operating system, and hypervisor software.
- the SYS RoT 264 include a variety of components, such as a security perimeter that defines what needs to be protected on the VES 148 , a secure central processing unit (CPU) that runs secure software/firmware, a runtime memory (e.g., a STACK, HEAP and global data as this data will contain keys in plain-text and other sensitive information), tamper resistance (e.g., a dedicated read only memory (ROM) that can only be accessed by the SYS RoT 264 , hardware cryptographic accelerators, a True Random Number Generator (TRNG) (e.g., to produce a high level of entropy required for the various security functions), a secure clock or secure counter for a reliable time measurement, secure storage for applications requiring a state knowledge or key management.
- a security perimeter that defines what needs to be protected on the VES 148
- a secure central processing unit (CPU) that runs secure software/firmware
- a runtime memory e.g., a STACK, HEAP and
- the VES 148 is the secure virtual environment that executes the Virtual Encryptors (a subset of the VMs 242 , 244 , 246 , 248 , 250 , 252 ) and other VM cyber and management software to securely control the VM environment for operations and cyber attack management.
- the VES 148 generally runs on a hypervisor and a trusted computing platform.
- Many VMs 242 , 244 , 246 , 248 , 250 , 252 may reside in the VES 148 .
- VEs can support QR algorithms.
- Many VMs 242 , 244 , 246 , 248 , 250 , 252 may reside in a datacenter (i.e., operating on multiple servers).
- VMs 242 , 244 , 246 , 248 , 250 , 252 can securely communicate with other VMs 242 , 244 , 246 , 248 , 250 , 252 inside or external to the datacenter 110 .
- VMs 242 , 244 , 246 , 248 , 250 , 252 operating as VEs 246 , 248 may implement any type of encryption (e.g., Layer 1 Link, Layer 2 Ethernet, Layer 3 IP, etc.).
- ZT SW 244 provides continuous zero trust security monitoring and multi-level policy enforcement.
- Boot CR SW 270 monitors the secure boot operation of the computing platform and VMs.
- CR SW 242 monitors VM 242 , 244 , 246 , 248 , 250 , 252 instances to prevent cyber attacks on the VMs 242 , 244 , 246 , 248 , 250 , 252 .
- the VMs 242 , 244 , 246 , 248 , 250 , 252 are activated and accessed by crypto binding data in the form of user tokens 234 , 240 , 260 .
- the SYS RoT 264 performs system hardware and software attestation and detects and reports anomalous system and VM behavior. It also authenticates and decrypts the content of VE 246 , 248 instances.
- VEs 246 , 248 can be implemented in VMs in various ways to ensure failsafe operations.
- VEs 246 , 248 can be run redundantly in separate VMs, one a primary VE and another a redundant VE where each monitors the result of the other for correctness.
- VEs 246 , 248 can be implemented in a serial layered manner that double-encrypts data e.g., as done in Commercial Solutions For Classified (CSfC) methods.
- VEs 246 , 248 can be monitored by machine learning (ML) or artificial intelligent (AI) functions.
- ML machine learning
- AI artificial intelligent
- the end user 256 is a remote cloud customer.
- the end user 256 can communicate with the secure datacenter 110 using an encrypted interface, such as through a hardware or virtual encryptor 258 .
- the end user 256 can be a smartphone, laptop computer, desktop computer, server computer, smart appliance, smart vehicle, or the like.
- the end user 256 (sometimes called a cloud customer) accesses information from the host VES 148 through an encrypted channel managed by encryptor 258 (e.g., a HWE or VE).
- Customer may be a secure lab site or any computing device end-point (e.g., a mobile device).
- the end user 256 can perform authentication to the secure datacenter 110 using a multi-factor authentication token (e.g., CIK, smart card, biometric, etc.).
- a multi-factor authentication token e.g., CIK, smart card, biometric, etc.
- the KMS 144 can digitally sign and encrypt an executable that is loaded and executed by a VM of the VMs 242 , 244 , 246 , 248 , 250 , 252 .
- the digitally signed and encrypted VM image can be verified to be from a trusted source, namely the U/OM 146 , SYS RoT 264 , CR SW 241 , or ZT SW 244 .
- the key authority 152 can provide seed keys in the form of trust anchors (TAs), private symmetric and private-public asymmetric key pairs to the KMS 144 .
- the KMS 144 can provide the VES 148 with the seed keys.
- the seed keys are used to initialize HWEs, VEs and other encryption software.
- a unique user token 234 , 240 , 260 can be provided to each of the KMS 144 , U/OM 146 , and end user 256 .
- Each user token 234 , 240 , 260 for a given user can be associated with metadata that includes a unique user identification (ID).
- ID unique user identification
- the secure datacenter 110 Responsive to the secure datacenter 110 (e.g., the U/OM 146 ) receiving a request to perform an operation using the VES 148 , it can verify that the user is to be trusted (e.g., by permissions checks, credentials checks, etc.). If the end user 256 is to be trusted, the request can be sent to the VES 148 . In addition to the credentials check by the U/OM 146 , the VES 148 can check user tokens 234 , 240 , 260 from the KMS 144 , U/OM 146 , and end user 256 . The user tokens 234 , 240 , 260 can all be required for the VES 148 to operate one of the VMs 146 to perform the requested function.
- the VES 148 can perform key split reconstitution, hashing, digital signature verification, biometric or a different authentication operation on a combination of one or more of the user tokens 234 , 240 , 260 . If (and only if) the result of the operation matches a result expected by the VES 148 , will the VES 148 have the VE 246 , 248 perform the requested operation.
- FIG. 3 illustrates, by way of example, a diagram of an embodiment of a redundant VM VE configuration.
- FIG. 4 illustrates, by way of example, a diagram of an embodiment of a diversity VM VE configuration.
- the VNF 272 can directly connect the VMs 246 , 248 to each other, such as by a virtual ethernet port or the like.
- plaintext (PT) unencrypted data is input to both VMs 246 , 248 .
- Both VM VEs perform the same encryption technique on the PT.
- the CT outputs are compared, such as by one or more of the VM VEs 246 , 248 .
- the CT output from one of the VM VEs 246 , 248 is used.
- PT is provided to one of the VM VEs 246 , 248 using cryptographic algorithm A and the output goes into the other VM VE 248 , 246 which performs a different cryptographic algorithm B on the encrypted data from the VM VE that performed cryptographic algorithm A.
- the doubly-encrypted CT is used as output.
- Both the diversity and the redundant VM VE configurations provide extra protection from leaking the PT. If one of the VM VEs 246 , 248 is not properly encrypting the PT, there is a second VM VE 248 , 246 that can operate to prevent the PT from leaking.
- FIG. 5 illustrates, by way of example, a diagram of an embodiment of a VE 300 .
- the VE 300 can be loaded onto and executed by a VM, such as the VM 246 , 248 .
- the VE 300 can include software crypto algorithms 330 that encrypt plaintext (PT) into ciphertext (CT) or decrypt CT into PT.
- Example crypto algorithm include the symmetric Advanced Encryption Algorithm (AES).
- a key management function 332 manages seed keys, TAs, mission keys, key splits, or the like to enable encryption, user authentication or verification.
- An encryptor management function 334 manages operational controls including the modes of the algorithms 330 , selection of channels, resets and zeroization of keys.
- the management interfaces can have secure connections to the KMS 144 and U/OM 146 .
- FIG. 6 illustrates, by way of example, a diagram of an embodiment of the KMS 144 .
- the KMS 144 includes the HWE or HSM 440 which provides cryptographic functions and data storage for the key management software.
- the KMS 144 further includes key management software 442 that adds, deletes, updates, or otherwise manages keys in the workstation, storage, programmer 446 .
- the KMS 144 includes provisioning SW 444 that performs the crypto provision operations 254 (see FIG. 2 ).
- the workstation, storage, programmer 446 hosts the SW 442 , 444 and manages the operation of the HWE or HSM 440 .
- the workstation, storage, programmer 446 programs a physical user token device 452 that can be plugged into a machine to provide the user token 234 , 240 , 260 .
- FIG. 7 illustrates, by way of example, a diagram of an embodiment of the U/OM 146 .
- the U/OM 146 includes images (executable files, sometimes called SW) that using IaC and cloud orchestration capabilities can be securely loaded onto and executed by a VM 242 , 244 , 246 , 248 , 250 , 252 .
- the SW illustrated in FIG. 7 includes command and control software for CR SW 550 , ZT SW 552 , VE SW 554 , 556 , SDN SW 558 , CDS SW 560 .
- the SW can be configured by the U/OM 146 to perform operations when executed by a corresponding VM 242 , 244 , 246 , 248 , 250 , 252 .
- the workstation, storage 562 can store and configure the SW, communicate with the KMS 144 , and communicate with the VES 148 to perform operations for virtual secure cloud operations.
- the cloud orchestration SW 564 can implement the functionality of the U/OM
- FIG. 8 illustrates, by way of example, a diagram of an embodiment of a method 600 for HA VES operation.
- the method 600 as illustrated includes VM provisioning, at operation 660 ; U/OM management, at operation 662 , and execution at operation 666 .
- the operation 660 can include the KMS 144 connecting to a source to receive initial mission Trust Anchors (TAs).
- the operation 660 can include the KMS 144 signing and encrypting VM 242 , 244 , 246 , 248 , 250 , 252 images.
- the operation 600 can include the KMS 144 generating, signing, and encrypting user tokens 234 , 240 , 260 .
- the operation 660 can include the KMS 144 sending token records to the U/OM 146 .
- the operation 660 can include the KMS 144 sending TAs and bootloader key to the SYS RoT 264 .
- the operation 662 can include mission planning and configuration.
- the operation 662 can include network planning and configuration (SDN & SD-WAN).
- the operation 662 can include launching VMs 242 , 244 , 246 , 248 , 250 , 252 in the VES 148 .
- the operation 662 can include activating VMs 242 , 244 , 246 , 248 , 250 , 252 , such as by reconstituting key splits from token records.
- the operation 662 can include configuring multi-level zero trust software 244 .
- the operation 666 can include the KMS 144 managing VM 242 , 244 , 246 , 248 , 250 , 252 initialization, mission, and infrastructure key material.
- the operation 666 can include the KMS 144 rekeying a VM 242 , 244 , 246 , 248 , 250 , 252 .
- the operation 666 can include the KMS 144 working with the U/OM 146 bringing up or tearing down VMs 242 , 244 , 246 , 248 , 250 , 252 .
- the operation 666 can include the U/OM 146 orchestrating cloud and SDN network operations.
- the operation 666 can include the U/OM 146 monitoring the zero trust software 244 and VMs 242 , 244 , 246 , 248 , 250 , 252 for cyber attacks.
- FIG. 9 illustrates, by way of example, a diagram of an embodiment of a method 900 for secure VE provisioning.
- the method 900 as illustrated includes deriving, by a key management system (KMS), virtual encryptor (VE) token data that associates a VE with a user token, at operation 990 ; signing, by the KMS, a VE executable file, at operation 992 ; verifying the signature, by a root of trust (RoT) of a virtual encryptor system (VES), the VE, at operation 994 ; responsive to verifying signature, loading, by the VES, the executable file on a virtual machine (VM), at operation 996 ; receiving the user token data from the user device, at operation 998 ; and executing the VE responsive to determining an operation on a combination of the user token and the token data associated with the VE returns a specified value, at operation 999 .
- KMS key management system
- VE virtual encryptor
- the method 900 can further include refraining from executing the VE responsive to verification failing.
- the method 900 can further include, wherein the executable file is further encrypted.
- the method 900 can further include, wherein the system RoT is a hardware RoT (HW RoT) or a software RoT (SW RoT).
- the method 900 can further include, wherein the user token is a smart card, Crypto Ignition Key (CIK), biometric device, or smart phone.
- CIK Crypto Ignition Key
- the method 900 can further include, wherein the VE is one of a plurality of VEs executing on the VES, wherein two VEs of the plurality of VEs are configured in a redundant configuration or a diversity configuration.
- the method 900 can further include executing, by a second VM, zero trust security software, controlled by a user and operation management (U/OM), that provides multi-level zero trust security-focused monitoring and policy enforcement for VES hardware and software components.
- U/OM user and operation management
- the method 900 can further include, wherein the system RoT by using cyber resilient software verifies the boot operation of the host computer and VM workload integrity monitoring.
- the method 900 can further include monitoring, by SDN and IaC software controlled by the U/OM, operations of the VES including software-defining which workloads and versions of algorithms get deployed on which VEs, where VEs get to run and for how long, and which VEs are visible to which user.
- the method 900 can further include monitoring, by cyber resilience software controlled by the U/OM, operations of the VES.
- Embodiments provide an HA enterprise cloud system that provisions, launches, activates, and manages VEs (instantiated using VMs 242 , 244 , 246 , 248 , 250 , 252 ).
- Embodiments manage key material for VEs using KMS 144 and U/OM 146 management servers in the datacenter 110 .
- Embodiments can manage user activation tokens (e.g., in the form of a traditional CIK datakey, or can be smartcard, smartphone, or anything with storage capability).
- Embodiments can secure the VE VM 242 , 244 , 246 , 248 , 250 , 252 environment and associated services and infrastructure via multi-level, cryptographic software, data, network, host, and network binding.
- Embodiments can provide orchestration of VEs through VMs 242 , 244 , 246 , 248 , 250 , 252 with virtual network functions and/or in physical network functions (e.g., high-speed switches) to perform SDN orchestrated operations. This enables dynamic encrypted and SDN switched flows in any SDN network.
- Embodiment provide a capability for state-of-the-art cyber resilient technologies at both hardware and software level (via independent hardware & system root of trust capabilities) to continuously perform independent hardware and software attestation, mitigate hardware- and software-related supply chain risks, insider threats, and to also provide self-healing and decoy capabilities.
- Embodiment can incorporate multi-level zero trust security technologies across all pillars of zero trust (Identity, Devices, Networks, Workloads, and Data) to further cyber-harden U/OM 146 platform and its services.
- FIG. 10 illustrates, by way of example, a block diagram of an embodiment of a machine in the example form of a computer system 800 within which instructions, for causing the machine to perform any one or more of the methods discussed herein, may be executed.
- One or more of the secure datacenter 110 , tenant devices 114 , 116 , 118 , 130 , 132 , token access component 134 , 136 , 138 , 140 , 142 , KMS 144 , U/OM 146 , VES 148 , key authority 152 , crypto provision operation 254 , cyber resilient software 550 , zero trust software 552 , VMs 242 , 244 , 246 , 248 , 250 , 252 , SYS RoT 264 , encryptor component 150 , 152 , 154 , 156 , 158 , 160 , 258 , end user 256 , method 600 , method 700 , or other device, component, operation, or method discussed can include, or
- the machine may operate in the capacity of a server or a client machine in server-client network environment, or as a peer machine in a peer-to-peer (or distributed) network environment.
- the machine may be a personal computer (PC), server, a tablet PC, a set-top box (STB), a Personal Digital Assistant (PDA), a cellular telephone, a web appliance, a network router, switch or bridge, or any machine capable of executing instructions (sequential or otherwise) that specify actions to be taken by that machine.
- PC personal computer
- PDA Personal Digital Assistant
- STB set-top box
- a cellular telephone a cellular telephone
- web appliance a web appliance
- network router switch or bridge
- the example computer system 800 includes a processor 802 (e.g., a central processing unit (CPU), a graphics processing unit (GPU) or both), a main memory 804 and a static memory 806 , which communicate with each other via a bus 808 .
- the computer system 800 may further include a video display unit 810 (e.g., a liquid crystal display (LCD) or a cathode ray tube (CRT)).
- the computer system 800 also includes an alphanumeric input device 812 (e.g., a keyboard), a user interface (UI) navigation device 814 (e.g., a mouse), a mass storage unit 816 , a signal generation device 818 (e.g., a speaker), a network interface device 820 , and a radio 830 such as Bluetooth, Cellular, WWAN, WLAN, and NFC, permitting the application of security controls on such protocols.
- UI user interface
- the mass storage unit 816 includes a machine-readable medium 822 on which is stored one or more sets of instructions and data structures (e.g., software) 824 embodying or utilized by any one or more of the methodologies or functions described herein.
- the instructions 824 may also reside, completely or at least partially, within the main memory 804 and/or within the processor 802 during execution thereof by the computer system 800 , the main memory 804 and the processor 802 also constituting machine-readable media.
- machine-readable medium 822 is shown in an example embodiment to be a single medium, the term “machine-readable medium” may include a single medium or multiple media (e.g., a centralized or distributed database, and/or associated caches and servers) that store the one or more instructions or data structures.
- the term “machine-readable medium” shall also be taken to include any tangible medium that is capable of storing, encoding, or carrying instructions for execution by the machine and that cause the machine to perform any one or more of the methodologies of the present invention, or that is capable of storing, encoding, or carrying data structures utilized by or associated with such instructions.
- the term “machine-readable medium” shall accordingly be taken to include, but not be limited to, solid-state memories, and optical and magnetic media.
- machine-readable media include non-volatile memory, including by way of example semiconductor memory devices, e.g., Erasable Programmable Read-Only Memory (EPROM), Electrically Erasable Programmable Read-Only Memory (EEPROM), and flash memory devices; magnetic disks such as internal hard disks and removable disks; magneto-optical disks; and CD-ROM and DVD-ROM disks.
- semiconductor memory devices e.g., Erasable Programmable Read-Only Memory (EPROM), Electrically Erasable Programmable Read-Only Memory (EEPROM), and flash memory devices
- EPROM Erasable Programmable Read-Only Memory
- EEPROM Electrically Erasable Programmable Read-Only Memory
- flash memory devices e.g., electrically Erasable Programmable Read-Only Memory (EEPROM), and flash memory devices
- magnetic disks such as internal hard disks and removable disks
- magneto-optical disks e.g., magneto-optical disks
- the instructions 824 may further be transmitted or received over a communications network 826 using a transmission medium.
- the instructions 824 may be transmitted using the network interface device 820 and any one of a number of well-known transfer protocols (e.g., HTTPS).
- Examples of communication networks include a local area network (“LAN”), a wide area network (“WAN”), the Internet, mobile telephone networks, Plain Old Telephone (POTS) networks, wireless data networks (e.g., WiFi and WiMax networks) and satellite communications networks.
- POTS Plain Old Telephone
- wireless data networks e.g., WiFi and WiMax networks
- satellite communications networks satellite communications networks.
- transmission medium shall be taken to include any intangible medium that is capable of storing, encoding, or carrying instructions for execution by the machine, and includes digital or analog communications signals or other intangible media to facilitate communication of such software.
- Example 1 includes, a method for a secure virtual encryptor system, the method comprising deriving, by a key management system (KMS), virtual encryptor (VE) token data that associates a VE with a user token, signing, by the KMS, a VE executable file, verifying the signature, by a system root of trust (RoT) of a virtual encryptor system (VES), the VE, responsive to verifying signature, loading, by the VES, the executable file on a virtual machine (VM), receiving the user token data from the user device; and executing the VE responsive to determining an operation on a combination of the user token and the token data associated with the VE returns a specified value.
- KMS key management system
- VE virtual encryptor
- Example 1 further includes refraining from executing the VE responsive to verification failing.
- Example 3 at least one of Examples 1-2 further includes, wherein the executable file is further encrypted.
- Example 4 at least one of Examples 1-3 further includes, wherein the system RoT is a hardware RoT (HW RoT) or a software RoT.
- HW RoT hardware RoT
- a software RoT software RoT
- Example 5 at least one of Examples 1-3 further includes, wherein the user token is a smart card, Crypto Ignition Key (CIK), biometric device, or smart phone.
- the user token is a smart card, Crypto Ignition Key (CIK), biometric device, or smart phone.
- CIK Crypto Ignition Key
- Example 6 at least one of the Examples 1-5 further includes, wherein the VE is one of a plurality of VEs executing on the VES, wherein two VEs of the plurality of VEs are configured in a redundant configuration or a diversity configuration.
- Example 7 at least one of Examples 1-6 further includes executing, by a second VM, zero trust security software, controlled by a user and operation management (U/OM), that provides multi-level zero trust security-focused monitoring and policy enforcement for VES hardware and software components.
- U/OM user and operation management
- Example 8 at least one of Examples 1-7 further includes, wherein the system RoT by using cyber resilient software verifies the boot operation of the host computer and VM workload integrity monitoring.
- Example 9 at least one of Examples 1-8 further includes monitoring, by software defined network (SDN) and infrastructure as code (IaC) software controlled by the U/OM, operations of the VES including software-defining which workloads and versions of algorithms get deployed on which VEs, where VEs get to run and for how long, and which VEs are visible to which user.
- SDN software defined network
- IaC infrastructure as code
- Example 10 at least one of Examples 1-9 further includes monitoring, by cyber resilience software controlled by the U/OM, operations of the VES.
- Example 11 includes a secure virtual encryptor system comprising a key management system (KMS) configured to derive virtual encryptor (VE) token data that associates a VE with a user token and sign a VE executable file, a root of trust (RoT) of a virtual encryptor system (VES) configured to verify the signature of the VE executable file, the VES configured to, responsive to verifying signature, load the executable file on a virtual machine (VM) of the VES, receiving the user token data from the user device, and executing the VE responsive to determining an operation on a combination of the user token and the token data associated with the VE returns a specified value.
- KMS key management system
- VE virtual encryptor
- Example 11 further includes, wherein the VES is further configured to refrain from executing the VE responsive to verification failing.
- Example 13 at least one of Examples 11-12 further includes, wherein the executable file is further encrypted.
- Example 14 at least one of Examples 11-13 further includes wherein the system RoT is a hardware RoT (HW RoT) or a software RoT.
- HW RoT hardware RoT
- a software RoT software RoT
- Example 15 at least one of Examples 11-14 further includes, wherein the user token is a smart card, Crypto Ignition Key (CIK), biometric device, or smart phone.
- the user token is a smart card, Crypto Ignition Key (CIK), biometric device, or smart phone.
- Example 16 at least one of Examples 11-15 further includes, wherein the VE is one of a plurality of VEs executing on the VES, wherein two VEs of the plurality of VEs are configured in a redundant configuration or a diversity configuration.
- Example 17 at least one of Examples 11-16 further includes a second VM of the VES configured to execute zero trust security software, controlled by a user and operation management (U/OM), that provides multi-level zero trust security-focused monitoring and policy enforcement for VES hardware and software components.
- U/OM user and operation management
- Example 18 at least one of Examples 14-17 further includes, wherein the system RoT is an HW RoT and wherein the HW RoT, by using cyber resilient software, verifies the boot operation of the host computer and VM workload integrity monitoring.
- Example 19 at least one of Examples 11-18 further includes a software defined network (SDN) and infrastructure as code (IaC) software controlled by the U/OM configured to monitor operation of the VES including software-defining which workloads and versions of algorithms get deployed on which VEs, where VEs get to run and for how long, and which VEs are visible to which user.
- SDN software defined network
- IaC infrastructure as code
- Example 20 includes a non-transitory machine-readable medium including instructions that, when executed by a machine, cause the machine to perform operations of the method or system of one of Examples 1-19.
- the terms “a” or “an” are used, as is common in patent documents, to include one or more than one, independent of any other instance or usages of “at least one” or “one or more.”
- the term “or” is used to refer to a nonexclusive or, such that “A or B” includes “A but not B,” “B but not A,” and “A and B,” unless otherwise indicated.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
Description
- Embodiments provide an architecture, system, device, and method for a high assurance (HA) virtual encryptor (VE) system that can replace hardware encryptors (HWEs) and can be embedded into secure virtualized processing fabrics of datacenters used by cloud service providers. The HA VE can be used for protecting, managing, and communicating sensitive information without compromising security of the protected information.
- Current HA network systems used in commercial industry and governments have limited capabilities and are difficult to build, maintain, and obtain approval for use. HA networks are difficult to manage due to requiring specialized HWE devices including network encryptors and End Cryptographic Units (ECUs). HWEs provide confidentiality, identity, and authentication services and contain cryptographic capabilities to perform encryption & decryption, key management, and encryptor management functions. They can have single or multi-channel capabilities and can protect data-at-rest (DAR) or data-in-transit (DIT) at any layer of the open systems interconnection (OSI) model including Layer 1 Link,
Layer 2 Ethernet or Layer 3 Internet Protocol (IP) layer. HWEs can include Cross Domain Solution (CDS), Multi-Level Security (MLS), and cybersecurity capabilities. HWEs can take many physical forms such rack-mounted network equipment, handheld communication devices, and radiation-hardened space encryptors, all of which are difficult to integrate into computing fabrics of cloud datacenters due to their physical constraints. Hardware user tokens can be used to provide user identity or key/certificate data stored in smart cards, Crypto Ignition Key (CIK), and other user token devices. HWEs are provisioned with software, credentials, and key material before delivered to the end user and can maintain continuous connections with a network and/or key management system (KMS) for control and key/software updating. -
FIG. 1 illustrates, by way of example, a block diagram of an embodiment of an HA virtual encryptor (VE) system. -
FIG. 2 illustrates, by way of example, a block diagram of an embodiment of a system that includes the secure datacenter ofFIG. 1 in more detail. -
FIG. 3 illustrates, by way of example, a diagram of an embodiment of a redundant virtual machine (VM) VE configuration. -
FIG. 4 illustrates, by way of example, a diagram of an embodiment of a diversity VM VE configuration. -
FIG. 5 illustrates, by way of example, a block diagram of an embodiment of a VE. -
FIG. 6 illustrates, by way of example, a block diagram of an embodiment of a key management system (KMS). -
FIG. 7 illustrates, by way of example, a block diagram of an embodiment of an user and orchestration manager (U/OM). -
FIG. 8 illustrates, by way of example, a diagram of an embodiment of a method for HA VES operation. -
FIG. 9 illustrates, by way of example, a diagram of an embodiment of a method for HA VES provisioning and operation. -
FIG. 10 illustrates, by way of example, a block diagram of an embodiment of a machine in the example form of a computer system within which instructions, for causing the machine to perform any one or more of the methods discussed herein, may be executed. - The following description and the drawings sufficiently illustrate specific embodiments to enable those skilled in the art to practice them. Other embodiments may incorporate structural, logical, electrical, process, and other changes. Portions and features of some embodiments may be included in, or substituted for, those of other embodiments. Embodiments set forth in the claims encompass all available equivalents of those claims.
- Alternative to a HWE, HWE capabilities can be done securely by virtual encryptors (VEs) implemented in virtual machines (VMs) that run on hypervisors used in datacenters by cloud service providers. This lowers the cost of implementing HWEs, standing up HA network systems, and enables far greater cryptographic services when VEs are embedded directly into the virtualized processing fabrics of datacenters that are not possible using HWEs. Cyber resiliency, zero trust, cloud orchestration, HA key management system (KMS), and physical user tokens produced by the KMS provides a secure virtual environment to protect VE operations and information in any type of cloud datacenter or computing system using virtualization. Virtualization uses software to simulate hardware functionality and allows a network to operate multiple operating systems and applications on a single server. Virtualization also provides economies of scale and greater efficiency than non-virtualized systems. Protected remote enclaves can be connected using HWE or VE. Data shared between enclaves having different classification levels can be provided through Cross Domain Solution (CDS) in multi-tenant cloud systems.
- As discussed in the Background, current HA networks for protecting sensitive information have limited capabilities and can depend on HWEs including End Crypto Units (ECUs) that are difficult to maintain and are not suitable for embedding into datacenter virtual processing fabrics. Cloud computing technology solves the deficiencies of current stove-piped HA networks by allowing users to subscribe to HA computing from secure cloud service providers. However, there is no standard HA architecture for securely implementing alternative VEs in cloud datacenters. In this document, HA means the system is meant to protect any level of sensitive information from high value commercial information to highly sensitive government information.
- Embodiments provide an architecture of a HA VE system, which aligns with zero trust principles, key and software provisioning, cyber resiliency, and cloud orchestration to provide, protect, and manage the life-cycle of VEs in secure datacenters and computer systems using virtualization. Embodiments support Crypto Modernization 2 (CM2) and Quantum Resistant (QR) algorithm standards. QR algorithms—also known as post-quantum, quantum-secure, and quantum-safe—are cryptographic algorithms that can fend off attacks from quantum computers.
-
FIG. 1 illustrates, by way of example, a block diagram of an embodiment of anHA VE system 100. Thesystem 100 as illustrated includes asecure cloud datacenter 110 communicatively coupled to anetwork 112 and a plurality of 114, 116, 118, 130, 132 where 132 is for remote management and 114 has a dedicated or direct secure connection. Theremote devices secure datacenter 110 provides HA VE capabilities that are sufficient for protecting sensitive information. Thesecure datacenter 110 and its operations are described in more detail regardingFIG. 2 . Thesecure datacenter 110 can provide HA-as-a-service (HAaaS) cloud services that leverage Infrastructure as Code (IAC) and cloud orchestration capabilities to securely provision and operate cyber-resilient VEs at scale. Thesecure datacenter 110 can include multiple distributed VEs that enable multi-domain and multi-tenant datacenters using CDS and software-defined network (SDN) orchestration of virtual SDN switches and routers. Thesecure datacenter 110 contains HA crypto-agile and Quantum-safe KMS 148. It also combines continuous, zero trust security-based monitoring and policy enforcement with advanced cyber resiliency and cloud orchestration capabilities. - The
secure datacenter 110 has the capability to service multiple tenant private clouds, illustrated as respective individual instances of 114, 116, 118, 130, 132. A respective customer associated with thetenant devices 114, 116, 118, 130, 132 each subscribe to services provided by thetenant devices secure datacenter 110. Each of the 114, 116, 118, 130, 132 has atenant devices 134, 136, 138, 140, 142, respectively, that manages tokens. The tokens are authentication data that can activate VEs and allow access to services of thetoken access device secure datacenter 110. Example 134, 136, 138, 140, 142 are smart cards, CIK, smart phones, or other computing devices.token access devices - The
secure datacenter 110 can include a hardware KMS 144. The KMS 144 manages user tokens, initialization, provisioning, and disablement, and key materials for accessing and activating VEs that provide encryption functionality. Thesecure datacenter 110 can include a user and orchestration management system (U/OM) 146. The U/OM 146 includes cloud orchestration software and control software that configures and monitors tamper-resistant, cyber resilient software and zero trust security-focused software executing in a virtual encryption system (VES) 148 to continuously ensure VES-wide integrity and security. The U/OM 146 transfers VES software and key material to aVES 148. The remote U/OM 132 can perform the same configuration and monitoring as the U/OM 146, but not a VES software transfer operation. If available, the U/OM 146 can also utilize quantum networks and Quantum Key Distribution (QKD) schemes (e.g., BB84, B92, and others) as an additional layer of security for VES key distribution. - The VES 148 includes a group of VMs that operate in a secure virtual environment. The VES includes one or more VEs in the VMs that are instantiated on demand by the U/
OM 146 and continuously monitored by cyber resilient software 242 (seeFIG. 2 ) and zero trust software 244 (seeFIG. 2 ). VMs provide virtual network functions (VNFs) 272 that can form networks of virtual switches and routers managed by SDN controllers. - Each of the
secure data center 110 and the 114, 116, 118, 130, 132 can include a respective HWE ortenant devices 150, 152, 154, 156, 158, 160. The HWE or VE is responsible for encrypting and decrypting data, cryptographic key management, and encryptor management. More details regarding a VE is provided in a later FIG.VE -
FIG. 2 illustrates, by way of example, a block diagram of an embodiment of asystem 200 that includes thesecure datacenter 110 in more detail. Thesystem 200 as illustrated includes an externalkey authority 152 communicatively coupled securely to thesecure datacenter 110. Thesystem 200 as illustrated further includes anend user 256 communicatively coupled securely to thesecure datacenter 110. Thesystem 200 as illustrated further includesmultiple VESs 262 communicatively coupled securely to one or moreother VESs 148 within thedatacenter 110. - The
key authority 152 provides trust anchors (TAs), seed keys, and other crypto products from a trusted source. The crypto products from thekey authority 152 allow theKMS 144 andVES 148 to trust each other and to securely derive mission, infrastructure and initialization keys and other crypto products. An example key authority includes the government's key management infrastructure (KMI). - The
KMS 144 performscrypto provisioning operations 254. Thecrypto provisioning operations 254 program 234, 240, 260 used by therespective user tokens KMS 144, the U/OM 146, and theend user 256, respectively. Each of the 234, 240, 260 is generated based on a token that is based on one or more shared secret values, credentials, identities, or split keys that are associated or bound to a VE. This is also known as cryptographic binding. A Crypto Ignition Key (CIK) is an example hardware token that stores key splits. The token is a numeric value that is used by theuser tokens VES 148 to activate a 246, 248 and verify whether a request from theVE end user 256 is legitimate, safe, and to be performed by theVES 148, or is otherwise insecure and not to be performed by theVES 148. TheKMS 144 initializes 234, 240, 260 that are used to access and activateuser tokens 242, 244, 246, 248, 250, 252.VMs - The
VES 148 can operate using an enhanced system (SYS) root of trust (SYS RoT) 264 device that is attached to acomputer 266 as a stand-alone or pluggable (e.g., PCIe) hardware security module (HSM), a datacenter-ready control module (DC-SCM), M.2 plug-in module, or other cryptographic device. TheSYS RoT 264 enhances the security of the computer or server that provides the virtualization. The zerotrust software 244 will continuously use the output of theSYS RoT 264 to detect potential hardware-level or software-level tampering with VES-related infrastructure. An HSM is a physical computing device that safeguards and manages digital keys, performs encryption and decryption functions for digital signatures, and other cryptographic functions. The HSM includes a secure crypto processor chip. TheSYS RoT 264 can be a plug-in (a peripheral device coupled to a computer) or an external device coupled to a computer or network server. - The
SYS RoT 264 execute cyber resilient software (Boot CR SW) 270 that monitors the integrity of the boot operation of the computer or server. This verifies the bootloader, operating system or hypervisor software is not altered by a cyber attack. -
KMS 144 provisions the software contents of the 242, 244, 246, 248, 250, 252. ItVMs 246, 248 by configuring cryptographic algorithm/s with initial seed key material and encrypting and signing VE software instances. Theprovisions VEs KMS 144 can rekey 246, 248, keep records of key material, wraps keys for storage, and send encrypted key and software packages to U/VEs OM 146 to transfer to the 246, 248. TheVMs KMS 144 also signs the cyber resilient software (CR SW) 242 and zero trust software 244 (ZT SW) that is installed in one or more of the VMs. TheKMS 144 sends mission keys to 246, 248 periodically during operation.VEs Multiple KMS 144 units may be used to support scalability, high availability, and multi-level classifications. TheKMS 144 can include a database of theuser tokens 234. 240, 260, 242, 244, 246, 248, 250, 252 instances, encrypted keys, and other relevant data.VM - The U/
OM 146 utilizes Infrastructure as Code (IaC) services and cloud orchestration capabilities to automate the provisioning, deployment, and maintenance ofVES 148. An example cloud orchestration software is Overcast™ from Raytheon Company. The U/OM 146 performs cloud orchestration that launches and deletes software running in theVES 148 and controls connections between cloud datacenters. It also has the ability to live-migrate VE nodes or change theVES 148 network topologies on-the-fly to provide optional moving target defense capabilities. The U/OM 146 controls theZT SW 244 andCR SW 242, 246, 248, and other software running in theVEs VES 148. - Cloud orchestration automates the tasks to provision
VE VMs 246, deploy workloads, manage network visibility, and control user and workload access. Cloud orchestration also automates reclamation of unused capacity and returns it to resource pools. Cloud orchestration technologies integrate automated tasks and processes into a workflow to perform requested functions. Cloud orchestration can validate and/or authenticate 242, 244, 246, 248, 250, 252.VMs - The U/
OM 146 can support a wide range of open standard network management software. The U/OM 146 supports a unique combination of complementary cyber resilient and multi-level zero trust sensors and effectors, coupled with advanced, cryptographic resource, data, network, host, and service binding. The U/OM 146 can leverage out-of-band quantum key distribution network to further secure communications. The U/OM 146 can be integrated with IaC and software-defined wide area network (SDWAN) capabilities, such as to enable enterprise-level scalability, mission resiliency, and active defense (e.g., via polymorphic networking & moving target defense) at the same time. - The
VES 148 is a secure virtual environment in which software packages execute in VMs. Some of the VMs can operate as virtual encryptors. TheVES 148 can execute the cyber resilient software and zero trust software that are controlled or managed by the U/OM 146. TheCR SW 242 and theZT SW 244 operate to protect theVES 148 from a cyber attack. - The
242, 244, 246, 248, 250, 252 are software that operate in a guest machine (software) that runs on a hypervisor (a physical host machine). TheVMs 242, 244, 246, 248, 250, 252 can perform virtual encryptor operations (“virtual” because the encryption is performed in a VM).VMs - The U/
OM 246 can consist of one or multiple workstations running cloud orchestration, cyber resilient, zero trust, VE management, SDN, and other software applications. - Operations of the
VES 148 can be monitored by the cyberresilient software 242.Boot CR SW 270 is running in theSYS RoT 264 for theVES 148 server and monitors boot functions of theVES 148. Boot Shield™ and Electronic Armor™ from Raytheon Company are examples ofCR SW 242 andBoot CR SW 270. TheVES 248 includesZT SW 244 that continuously monitors theVES 148 for internal or external cyber attacks. TheZT SW 244 can work hand in hand with theCR SW 242 to detect and fend off common VE host attacks, including insider threats. REDPro ZTX™ from Raytheon Company is an example ofZT SW 244. - The
VES 148 can operate using anadditional SYS RoT 264. TheSYS RoT 264 provides independent, hardware attestation as well as trusted, secure boot capabilities that can decrypt and authenticate its own and a host's bootloader and application software. TheSYS RoT 264 performs system integrity, tamper detection, and cryptographic functions and can share its observations with theZT SW 244 to enable multi-level ZT security enforcement. TheSYS RoT 264 can verify signatures (e.g., using standard or QR algorithms) of software used in theVES 148 including host's bootloader, operating system, and hypervisor software. TheSYS RoT 264 include a variety of components, such as a security perimeter that defines what needs to be protected on theVES 148, a secure central processing unit (CPU) that runs secure software/firmware, a runtime memory (e.g., a STACK, HEAP and global data as this data will contain keys in plain-text and other sensitive information), tamper resistance (e.g., a dedicated read only memory (ROM) that can only be accessed by theSYS RoT 264, hardware cryptographic accelerators, a True Random Number Generator (TRNG) (e.g., to produce a high level of entropy required for the various security functions), a secure clock or secure counter for a reliable time measurement, secure storage for applications requiring a state knowledge or key management. - The
VES 148 is the secure virtual environment that executes the Virtual Encryptors (a subset of the 242, 244, 246, 248, 250, 252) and other VM cyber and management software to securely control the VM environment for operations and cyber attack management. TheVMs VES 148 generally runs on a hypervisor and a trusted computing platform. 242, 244, 246, 248, 250, 252 may reside in theMany VMs VES 148. VEs can support QR algorithms. 242, 244, 246, 248, 250, 252 may reside in a datacenter (i.e., operating on multiple servers).Many VMs 242, 244, 246, 248, 250, 252 can securely communicate withVMs 242, 244, 246, 248, 250, 252 inside or external to theother VMs datacenter 110. 242, 244, 246, 248, 250, 252 operating asVMs 246, 248 may implement any type of encryption (e.g., Layer 1 Link,VEs Layer 2 Ethernet, Layer 3 IP, etc.).ZT SW 244 provides continuous zero trust security monitoring and multi-level policy enforcement.Boot CR SW 270 monitors the secure boot operation of the computing platform and VMs.CR SW 242 242, 244, 246, 248, 250, 252 instances to prevent cyber attacks on themonitors VM 242, 244, 246, 248, 250, 252. TheVMs 242, 244, 246, 248, 250, 252 are activated and accessed by crypto binding data in the form ofVMs 234, 240, 260. Theuser tokens SYS RoT 264 performs system hardware and software attestation and detects and reports anomalous system and VM behavior. It also authenticates and decrypts the content of 246, 248 instances.VE -
246, 248 can be implemented in VMs in various ways to ensure failsafe operations.VEs 246, 248 can be run redundantly in separate VMs, one a primary VE and another a redundant VE where each monitors the result of the other for correctness.VEs 246, 248 can be implemented in a serial layered manner that double-encrypts data e.g., as done in Commercial Solutions For Classified (CSfC) methods.VEs 246, 248 can be monitored by machine learning (ML) or artificial intelligent (AI) functions.VEs - The
end user 256 is a remote cloud customer. Theend user 256 can communicate with thesecure datacenter 110 using an encrypted interface, such as through a hardware orvirtual encryptor 258. Theend user 256 can be a smartphone, laptop computer, desktop computer, server computer, smart appliance, smart vehicle, or the like. - The end user 256 (sometimes called a cloud customer) accesses information from the
host VES 148 through an encrypted channel managed by encryptor 258 (e.g., a HWE or VE). Customer may be a secure lab site or any computing device end-point (e.g., a mobile device). Theend user 256 can perform authentication to thesecure datacenter 110 using a multi-factor authentication token (e.g., CIK, smart card, biometric, etc.). - The
KMS 144 can digitally sign and encrypt an executable that is loaded and executed by a VM of the 242, 244, 246, 248, 250, 252. The digitally signed and encrypted VM image can be verified to be from a trusted source, namely the U/VMs OM 146, SYS RoT 264, CR SW 241, orZT SW 244. - At deployment, the
key authority 152 can provide seed keys in the form of trust anchors (TAs), private symmetric and private-public asymmetric key pairs to theKMS 144. TheKMS 144 can provide theVES 148 with the seed keys. The seed keys are used to initialize HWEs, VEs and other encryption software. A 234, 240, 260 can be provided to each of theunique user token KMS 144, U/OM 146, andend user 256. Each 234, 240, 260 for a given user can be associated with metadata that includes a unique user identification (ID). Responsive to the secure datacenter 110 (e.g., the U/OM 146) receiving a request to perform an operation using theuser token VES 148, it can verify that the user is to be trusted (e.g., by permissions checks, credentials checks, etc.). If theend user 256 is to be trusted, the request can be sent to theVES 148. In addition to the credentials check by the U/OM 146, theVES 148 can check 234, 240, 260 from theuser tokens KMS 144, U/OM 146, andend user 256. The 234, 240, 260 can all be required for theuser tokens VES 148 to operate one of theVMs 146 to perform the requested function. TheVES 148 can perform key split reconstitution, hashing, digital signature verification, biometric or a different authentication operation on a combination of one or more of the 234, 240, 260. If (and only if) the result of the operation matches a result expected by theuser tokens VES 148, will theVES 148 have the 246, 248 perform the requested operation.VE -
FIG. 3 illustrates, by way of example, a diagram of an embodiment of a redundant VM VE configuration.FIG. 4 illustrates, by way of example, a diagram of an embodiment of a diversity VM VE configuration. TheVNF 272 can directly connect the 246, 248 to each other, such as by a virtual ethernet port or the like. In the redundant VM VE configuration ofVMs FIG. 3 , plaintext (PT) unencrypted data is input to both 246, 248. Both VM VEs perform the same encryption technique on the PT. The CT outputs are compared, such as by one or more of theVMs 246, 248. If error free, then the CT output from one of theVM VEs 246, 248 is used. In the diversity VM VE configuration ofVM VEs FIG. 4 , PT is provided to one of the 246, 248 using cryptographic algorithm A and the output goes into theVM VEs 248, 246 which performs a different cryptographic algorithm B on the encrypted data from the VM VE that performed cryptographic algorithm A. The doubly-encrypted CT is used as output. Both the diversity and the redundant VM VE configurations provide extra protection from leaking the PT. If one of theother VM VE 246, 248 is not properly encrypting the PT, there is aVM VEs 248, 246 that can operate to prevent the PT from leaking.second VM VE -
FIG. 5 illustrates, by way of example, a diagram of an embodiment of aVE 300. TheVE 300 can be loaded onto and executed by a VM, such as the 246, 248. TheVM VE 300 can includesoftware crypto algorithms 330 that encrypt plaintext (PT) into ciphertext (CT) or decrypt CT into PT. Example crypto algorithm include the symmetric Advanced Encryption Algorithm (AES). Akey management function 332 manages seed keys, TAs, mission keys, key splits, or the like to enable encryption, user authentication or verification. Anencryptor management function 334 manages operational controls including the modes of thealgorithms 330, selection of channels, resets and zeroization of keys. The management interfaces can have secure connections to theKMS 144 and U/OM 146. -
FIG. 6 illustrates, by way of example, a diagram of an embodiment of theKMS 144. TheKMS 144, as previously discussed, includes the HWE orHSM 440 which provides cryptographic functions and data storage for the key management software. TheKMS 144 further includeskey management software 442 that adds, deletes, updates, or otherwise manages keys in the workstation, storage,programmer 446. TheKMS 144 includesprovisioning SW 444 that performs the crypto provision operations 254 (seeFIG. 2 ). The workstation, storage,programmer 446 hosts the 442, 444 and manages the operation of the HWE orSW HSM 440. The workstation, storage,programmer 446 programs a physical usertoken device 452 that can be plugged into a machine to provide the 234, 240, 260.user token -
FIG. 7 illustrates, by way of example, a diagram of an embodiment of the U/OM 146. The U/OM 146 includes images (executable files, sometimes called SW) that using IaC and cloud orchestration capabilities can be securely loaded onto and executed by a 242, 244, 246, 248, 250, 252. The SW illustrated inVM FIG. 7 includes command and control software forCR SW 550,ZT SW 552, 554, 556,VE SW SDN SW 558,CDS SW 560. The SW can be configured by the U/OM 146 to perform operations when executed by a 242, 244, 246, 248, 250, 252. The workstation,corresponding VM storage 562 can store and configure the SW, communicate with theKMS 144, and communicate with theVES 148 to perform operations for virtual secure cloud operations. Thecloud orchestration SW 564 can implement the functionality of the U/OM 146 discussed herein. -
FIG. 8 illustrates, by way of example, a diagram of an embodiment of amethod 600 for HA VES operation. Themethod 600 as illustrated includes VM provisioning, atoperation 660; U/OM management, atoperation 662, and execution atoperation 666. - The
operation 660 can include theKMS 144 connecting to a source to receive initial mission Trust Anchors (TAs). Theoperation 660 can include theKMS 144 signing and encrypting 242, 244, 246, 248, 250, 252 images. TheVM operation 600 can include theKMS 144 generating, signing, and encrypting 234, 240, 260. Theuser tokens operation 660 can include theKMS 144 sending token records to the U/OM 146. Theoperation 660 can include theKMS 144 sending TAs and bootloader key to theSYS RoT 264. - The
operation 662 can include mission planning and configuration. Theoperation 662 can include network planning and configuration (SDN & SD-WAN). Theoperation 662 can include launching 242, 244, 246, 248, 250, 252 in theVMs VES 148. Theoperation 662 can include activating 242, 244, 246, 248, 250, 252, such as by reconstituting key splits from token records. TheVMs operation 662 can include configuring multi-level zerotrust software 244. - The
operation 666 can include theKMS 144 managing 242, 244, 246, 248, 250, 252 initialization, mission, and infrastructure key material. TheVM operation 666 can include theKMS 144 rekeying a 242, 244, 246, 248, 250, 252. TheVM operation 666 can include theKMS 144 working with the U/OM 146 bringing up or tearing down 242, 244, 246, 248, 250, 252. TheVMs operation 666 can include the U/OM 146 orchestrating cloud and SDN network operations. Theoperation 666 can include the U/OM 146 monitoring the zerotrust software 244 and 242, 244, 246, 248, 250, 252 for cyber attacks.VMs -
FIG. 9 illustrates, by way of example, a diagram of an embodiment of amethod 900 for secure VE provisioning. Themethod 900 as illustrated includes deriving, by a key management system (KMS), virtual encryptor (VE) token data that associates a VE with a user token, atoperation 990; signing, by the KMS, a VE executable file, atoperation 992; verifying the signature, by a root of trust (RoT) of a virtual encryptor system (VES), the VE, atoperation 994; responsive to verifying signature, loading, by the VES, the executable file on a virtual machine (VM), atoperation 996; receiving the user token data from the user device, atoperation 998; and executing the VE responsive to determining an operation on a combination of the user token and the token data associated with the VE returns a specified value, atoperation 999. - The
method 900 can further include refraining from executing the VE responsive to verification failing. Themethod 900 can further include, wherein the executable file is further encrypted. Themethod 900 can further include, wherein the system RoT is a hardware RoT (HW RoT) or a software RoT (SW RoT). Themethod 900 can further include, wherein the user token is a smart card, Crypto Ignition Key (CIK), biometric device, or smart phone. - The
method 900 can further include, wherein the VE is one of a plurality of VEs executing on the VES, wherein two VEs of the plurality of VEs are configured in a redundant configuration or a diversity configuration. Themethod 900 can further include executing, by a second VM, zero trust security software, controlled by a user and operation management (U/OM), that provides multi-level zero trust security-focused monitoring and policy enforcement for VES hardware and software components. Themethod 900 can further include, wherein the system RoT by using cyber resilient software verifies the boot operation of the host computer and VM workload integrity monitoring. Themethod 900 can further include monitoring, by SDN and IaC software controlled by the U/OM, operations of the VES including software-defining which workloads and versions of algorithms get deployed on which VEs, where VEs get to run and for how long, and which VEs are visible to which user. Themethod 900 can further include monitoring, by cyber resilience software controlled by the U/OM, operations of the VES. - Embodiments provide an HA enterprise cloud system that provisions, launches, activates, and manages VEs (instantiated using
242, 244, 246, 248, 250, 252). Embodiments manage key material forVMs VEs using KMS 144 and U/OM 146 management servers in thedatacenter 110. Embodiments can manage user activation tokens (e.g., in the form of a traditional CIK datakey, or can be smartcard, smartphone, or anything with storage capability). Embodiments can secure the 242, 244, 246, 248, 250, 252 environment and associated services and infrastructure via multi-level, cryptographic software, data, network, host, and network binding. Embodiments can provide orchestration of VEs throughVE VM 242, 244, 246, 248, 250, 252 with virtual network functions and/or in physical network functions (e.g., high-speed switches) to perform SDN orchestrated operations. This enables dynamic encrypted and SDN switched flows in any SDN network. Embodiment provide a capability for state-of-the-art cyber resilient technologies at both hardware and software level (via independent hardware & system root of trust capabilities) to continuously perform independent hardware and software attestation, mitigate hardware- and software-related supply chain risks, insider threats, and to also provide self-healing and decoy capabilities. Embodiment can incorporate multi-level zero trust security technologies across all pillars of zero trust (Identity, Devices, Networks, Workloads, and Data) to further cyber-harden U/VMs OM 146 platform and its services. -
FIG. 10 illustrates, by way of example, a block diagram of an embodiment of a machine in the example form of acomputer system 800 within which instructions, for causing the machine to perform any one or more of the methods discussed herein, may be executed. One or more of thesecure datacenter 110, 114, 116, 118, 130, 132,tenant devices 134, 136, 138, 140, 142,token access component KMS 144, U/OM 146,VES 148,key authority 152,crypto provision operation 254, cyberresilient software 550, zerotrust software 552, 242, 244, 246, 248, 250, 252, SYS RoT 264,VMs 150, 152, 154, 156, 158, 160, 258,encryptor component end user 256,method 600, method 700, or other device, component, operation, or method discussed can include, or be implemented or performed by one or more of the components of thecomputer system 800. In a networked deployment, the machine may operate in the capacity of a server or a client machine in server-client network environment, or as a peer machine in a peer-to-peer (or distributed) network environment. The machine may be a personal computer (PC), server, a tablet PC, a set-top box (STB), a Personal Digital Assistant (PDA), a cellular telephone, a web appliance, a network router, switch or bridge, or any machine capable of executing instructions (sequential or otherwise) that specify actions to be taken by that machine. Further, while only a single machine is illustrated, the term “machine” shall also be taken to include any collection of machines that individually or jointly execute a set (or multiple sets) of instructions to perform any one or more of the methodologies discussed herein. - The
example computer system 800 includes a processor 802 (e.g., a central processing unit (CPU), a graphics processing unit (GPU) or both), amain memory 804 and astatic memory 806, which communicate with each other via abus 808. Thecomputer system 800 may further include a video display unit 810 (e.g., a liquid crystal display (LCD) or a cathode ray tube (CRT)). Thecomputer system 800 also includes an alphanumeric input device 812 (e.g., a keyboard), a user interface (UI) navigation device 814 (e.g., a mouse), amass storage unit 816, a signal generation device 818 (e.g., a speaker), anetwork interface device 820, and aradio 830 such as Bluetooth, Cellular, WWAN, WLAN, and NFC, permitting the application of security controls on such protocols. - The
mass storage unit 816 includes a machine-readable medium 822 on which is stored one or more sets of instructions and data structures (e.g., software) 824 embodying or utilized by any one or more of the methodologies or functions described herein. Theinstructions 824 may also reside, completely or at least partially, within themain memory 804 and/or within theprocessor 802 during execution thereof by thecomputer system 800, themain memory 804 and theprocessor 802 also constituting machine-readable media. - While the machine-
readable medium 822 is shown in an example embodiment to be a single medium, the term “machine-readable medium” may include a single medium or multiple media (e.g., a centralized or distributed database, and/or associated caches and servers) that store the one or more instructions or data structures. The term “machine-readable medium” shall also be taken to include any tangible medium that is capable of storing, encoding, or carrying instructions for execution by the machine and that cause the machine to perform any one or more of the methodologies of the present invention, or that is capable of storing, encoding, or carrying data structures utilized by or associated with such instructions. The term “machine-readable medium” shall accordingly be taken to include, but not be limited to, solid-state memories, and optical and magnetic media. Specific examples of machine-readable media include non-volatile memory, including by way of example semiconductor memory devices, e.g., Erasable Programmable Read-Only Memory (EPROM), Electrically Erasable Programmable Read-Only Memory (EEPROM), and flash memory devices; magnetic disks such as internal hard disks and removable disks; magneto-optical disks; and CD-ROM and DVD-ROM disks. - The
instructions 824 may further be transmitted or received over acommunications network 826 using a transmission medium. Theinstructions 824 may be transmitted using thenetwork interface device 820 and any one of a number of well-known transfer protocols (e.g., HTTPS). Examples of communication networks include a local area network (“LAN”), a wide area network (“WAN”), the Internet, mobile telephone networks, Plain Old Telephone (POTS) networks, wireless data networks (e.g., WiFi and WiMax networks) and satellite communications networks. The term “transmission medium” shall be taken to include any intangible medium that is capable of storing, encoding, or carrying instructions for execution by the machine, and includes digital or analog communications signals or other intangible media to facilitate communication of such software. - Example 1 includes, a method for a secure virtual encryptor system, the method comprising deriving, by a key management system (KMS), virtual encryptor (VE) token data that associates a VE with a user token, signing, by the KMS, a VE executable file, verifying the signature, by a system root of trust (RoT) of a virtual encryptor system (VES), the VE, responsive to verifying signature, loading, by the VES, the executable file on a virtual machine (VM), receiving the user token data from the user device; and executing the VE responsive to determining an operation on a combination of the user token and the token data associated with the VE returns a specified value.
- In Example 2, Example 1 further includes refraining from executing the VE responsive to verification failing.
- In Example 3, at least one of Examples 1-2 further includes, wherein the executable file is further encrypted.
- In Example 4, at least one of Examples 1-3 further includes, wherein the system RoT is a hardware RoT (HW RoT) or a software RoT.
- In Example 5, at least one of Examples 1-3 further includes, wherein the user token is a smart card, Crypto Ignition Key (CIK), biometric device, or smart phone.
- In Example 6, at least one of the Examples 1-5 further includes, wherein the VE is one of a plurality of VEs executing on the VES, wherein two VEs of the plurality of VEs are configured in a redundant configuration or a diversity configuration.
- In Example 7, at least one of Examples 1-6 further includes executing, by a second VM, zero trust security software, controlled by a user and operation management (U/OM), that provides multi-level zero trust security-focused monitoring and policy enforcement for VES hardware and software components.
- In Example 8, at least one of Examples 1-7 further includes, wherein the system RoT by using cyber resilient software verifies the boot operation of the host computer and VM workload integrity monitoring.
- In Example 9, at least one of Examples 1-8 further includes monitoring, by software defined network (SDN) and infrastructure as code (IaC) software controlled by the U/OM, operations of the VES including software-defining which workloads and versions of algorithms get deployed on which VEs, where VEs get to run and for how long, and which VEs are visible to which user.
- In Example 10, at least one of Examples 1-9 further includes monitoring, by cyber resilience software controlled by the U/OM, operations of the VES.
- Example 11 includes a secure virtual encryptor system comprising a key management system (KMS) configured to derive virtual encryptor (VE) token data that associates a VE with a user token and sign a VE executable file, a root of trust (RoT) of a virtual encryptor system (VES) configured to verify the signature of the VE executable file, the VES configured to, responsive to verifying signature, load the executable file on a virtual machine (VM) of the VES, receiving the user token data from the user device, and executing the VE responsive to determining an operation on a combination of the user token and the token data associated with the VE returns a specified value.
- In Example 12, Example 11 further includes, wherein the VES is further configured to refrain from executing the VE responsive to verification failing.
- In Example 13, at least one of Examples 11-12 further includes, wherein the executable file is further encrypted.
- In Example 14, at least one of Examples 11-13 further includes wherein the system RoT is a hardware RoT (HW RoT) or a software RoT.
- In Example 15, at least one of Examples 11-14 further includes, wherein the user token is a smart card, Crypto Ignition Key (CIK), biometric device, or smart phone.
- In Example 16, at least one of Examples 11-15 further includes, wherein the VE is one of a plurality of VEs executing on the VES, wherein two VEs of the plurality of VEs are configured in a redundant configuration or a diversity configuration.
- In Example 17, at least one of Examples 11-16 further includes a second VM of the VES configured to execute zero trust security software, controlled by a user and operation management (U/OM), that provides multi-level zero trust security-focused monitoring and policy enforcement for VES hardware and software components.
- In Example 18, at least one of Examples 14-17 further includes, wherein the system RoT is an HW RoT and wherein the HW RoT, by using cyber resilient software, verifies the boot operation of the host computer and VM workload integrity monitoring.
- In Example 19, at least one of Examples 11-18 further includes a software defined network (SDN) and infrastructure as code (IaC) software controlled by the U/OM configured to monitor operation of the VES including software-defining which workloads and versions of algorithms get deployed on which VEs, where VEs get to run and for how long, and which VEs are visible to which user.
- Example 20 includes a non-transitory machine-readable medium including instructions that, when executed by a machine, cause the machine to perform operations of the method or system of one of Examples 1-19.
- Although an embodiment has been described with reference to specific example embodiments, it will be evident that various modifications and changes may be made to these embodiments without departing from the broader spirit and scope of the invention. Accordingly, the specification and drawings are to be regarded in an illustrative rather than a restrictive sense. The accompanying drawings that form a part hereof, show by way of illustration, and not of limitation, specific embodiments in which the subject matter may be practiced. The embodiments illustrated are described in sufficient detail to enable those skilled in the art to practice the teachings disclosed herein. Other embodiments may be utilized and derived therefrom, such that structural and logical substitutions and changes may be made without departing from the scope of this disclosure. This Detailed Description, therefore, is not to be taken in a limiting sense, and the scope of various embodiments is defined only by the appended claims, along with the full range of equivalents to which such claims are entitled.
- Although specific embodiments have ben illustrated and described herein, it should be appreciated that any arrangement calculated to achieve the same purpose may be substituted for the specific embodiments shown. This disclosure is intended to cover any and all adaptations or variations of various embodiments. Combinations of the above embodiments, and other embodiments not specifically described herein, will be apparent to those of skill in the art upon reviewing the above description.
- In this document, the terms “a” or “an” are used, as is common in patent documents, to include one or more than one, independent of any other instance or usages of “at least one” or “one or more.” In this document, the term “or” is used to refer to a nonexclusive or, such that “A or B” includes “A but not B,” “B but not A,” and “A and B,” unless otherwise indicated. In this document, the terms “including” and “in which” are used as the plain-English equivalents of the respective terms “comprising” and “wherein.” Also, in the following claims, the terms “including” and “comprising” are open-ended, that is, a system, user equipment (UE), article, composition, formulation, or process that includes elements in addition to those listed after such a term in a claim are still deemed to fall within the scope of that claim. Moreover, in the following claims, the terms “first,” “second,” and “third,” etc. are used merely as labels, and are not intended to impose numerical requirements on their objects.
- The Abstract of the Disclosure is provided to comply with 37 C.F.R. § 1.72(b), requiring an abstract that will allow the reader to quickly ascertain the nature of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims. In addition, in the foregoing Detailed Description, it can be seen that various features are grouped together in a single embodiment for the purpose of streamlining the disclosure. This method of disclosure is not to be interpreted as reflecting an intention that the claimed embodiments require more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive subject matter lies in less than all features of a single disclosed embodiment. Thus the following claims are hereby incorporated into the Detailed Description, with each claim standing on its own as a separate embodiment.
Claims (20)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US17/980,958 US12316763B2 (en) | 2022-11-04 | 2022-11-04 | High assurance virtual encryptor system |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US17/980,958 US12316763B2 (en) | 2022-11-04 | 2022-11-04 | High assurance virtual encryptor system |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| US20240154809A1 true US20240154809A1 (en) | 2024-05-09 |
| US12316763B2 US12316763B2 (en) | 2025-05-27 |
Family
ID=90928350
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US17/980,958 Active 2043-05-23 US12316763B2 (en) | 2022-11-04 | 2022-11-04 | High assurance virtual encryptor system |
Country Status (1)
| Country | Link |
|---|---|
| US (1) | US12316763B2 (en) |
-
2022
- 2022-11-04 US US17/980,958 patent/US12316763B2/en active Active
Non-Patent Citations (3)
| Title |
|---|
| AlBelooshi et al. Securing Cryptographic Keys in the Cloud: a Survey. IEEE Cloud Computing Vol. 3 Issue 4. pp. 42-56 (Year: 2016) * |
| Chu et al. Secure Cryptography Infrastructure in the Cloud. 2019 IEEE Global Communications Conference. pp. 1-7 (Year: 2019) * |
| Zhao et al. Towards a Secure Joint Cloud with Confidential Computing. 2022 IEEE International Conference on Joint Cloud Computing. pp 79-88 (Year: 2022) * |
Also Published As
| Publication number | Publication date |
|---|---|
| US12316763B2 (en) | 2025-05-27 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11604901B2 (en) | Systems and methods for using extended hardware security modules | |
| US10454916B2 (en) | Systems and methods for implementing security | |
| US10171432B2 (en) | Systems to implement security in computer systems | |
| US10511436B1 (en) | Protecting key material using white-box cryptography and split key techniques | |
| US10509914B1 (en) | Data policy implementation in a tag-based policy architecture | |
| US10153906B2 (en) | Systems and methods for implementing computer security | |
| US9124640B2 (en) | Systems and methods for implementing computer security | |
| EP2791817B1 (en) | Cryptographic certification of secure hosted execution environments | |
| US9143491B2 (en) | Quorum-based virtual machine security | |
| US20150229619A1 (en) | Trusted execution within a distributed computing system | |
| Han et al. | Toward scaling hardware security module for emerging cloud services | |
| EP2997692A1 (en) | Procedure for platform enforced secure storage in infrastructure clouds | |
| US12355873B1 (en) | Secure cryptographic secret bootstrapping in a provider network | |
| US20210334377A1 (en) | Method for dynamically establishing a secure computing infrastructure | |
| US12316763B2 (en) | High assurance virtual encryptor system | |
| Sathya Narayana et al. | Trusted model for virtual machine security in cloud computing | |
| Paladi | Trust but verify: trust establishment mechanisms in infrastructure clouds | |
| Santos et al. | Excalibur: Building Trustworthy Cloud Services | |
| Paladi | Trust but Verify |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
| AS | Assignment |
Owner name: RAYTHEON COMPANY, MASSACHUSETTS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:FURUSAWA, MICHAEL M.;GOTTSCHLICH, SUSAN N.;STAAB, TORSTEN A.;SIGNING DATES FROM 20221110 TO 20221114;REEL/FRAME:062056/0816 |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS |
|
| STCF | Information on status: patent grant |
Free format text: PATENTED CASE |